@techreport{shahbar2017-dataset,
title = {Anon17: Network Traffic Dataset of Anonymity Services},
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
institution = {Dalhousie University},
year = {2017},
month = {March},
abstract = {{One of the difficulties that face researchers on the anonymity networks
field is the lack of anonymity dataset. Researchers need to collect their data to
conduct a research or to use a simulated environment to collect the data they
need. The lack of such a dataset is due to the nature of the anonymity networks.
These anonymity networks aim to provide certain level of privacy for the users.
In this paper, we present Anon17, a traffic flow dataset of different anonymity
services. Anon17 specifically contains data collected from three anonymity
networks; Tor, JonDonym, and I2P.}},
www_section = {Traffic analysis},
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-03.pdf},
keywords = {Dataset ; Tor ; I2P ; JonDonym ; Traffic Flow ; Anonymity},
}

@techreport{shahbar2017-measuring-anonymity-services,
title = {Weighted Factors for Measuring Anonymity Services: A Case Study on Tor,
JonDonym, and I2P},
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
institution = {Dalhousie University},
year = {2017},
month = {January},
abstract = {{There are many systems that provide anonymity service for the users. Most of
these systems work on the separation between the users' identity and the final
destination. The level of anonymity these services provide affected by several
factors. Some of these factors are related to the design of the anonymity service
itself. Others are related to how the system is used or what is the
application/purpose the user wants to run over the anonymity service. In this
paper we: (i) propose five factors that aim to measure the anonymity level from
the user's perspective; (ii) evaluate these factors on three anonymity services,
namely Tor, JonDonym, and I2P as case studies; and (iii) present a mechanism to
evaluate anonymity services based on our factors and measure the level of
anonymity.}},
www_section = {Anonymous communication},
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/CS-2017-01.pdf},
keywords = {Anonymity Factors ; Metrics ; Tor ; I2P ; JonDonym},
}

@inproceedings{jeong2016,
title = {A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure},
author = {Seong Hoon Jeong et al},
booktitle = {Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
year = {2016},
month = {August},
pages = {557--558},
www_section = {Traffic analysis},
www_pdf_url = {https://www.cse.buffalo.edu/~mohaisen/doc/16-sigcomm.pdf},
keywords = {I2P, DNS, privacy, security, network analysis},
abstract = {{The Invisible Internet Project (I2P) is an overlay network that provides
secure and anonymous communication chan-he nels. EepSites are the anonymous
websites hosted in the I2P network. To access the eepSites, DNS requests of a
domainnd name suffixed with the .i2p pseudo top-level domain (TLD)their are
routed within the I2P network. However, not only thatption of the .i2p queries
are leaking in the public DNS infrastructure,both but also such leakage has
various plausible root causes andance implications that are different from other
related leakage. Ine this paper, we analyze the leaked .i2p requests captured iny
the A and J root name servers of the public DNS, showingas its that a large
number of queries are observed and outlining various potential directions of
addressing such leakage.}},
}

@inproceedings{conrad2014,
title = {A Survey on Tor and I2P},
author = {Bernd Conrad and Fatemeh Shirazi},
booktitle = {Proceedings of the 9th International Conference on Internet Monitoring and
Protection (ICIMP 2014)},
year = {2014},
www_section = {Anonymous communication},
www_pdf_url = {/_static/pdf/icimp_2014_1_40_30015.pdf},
keywords = {Tor; I2P; low latency anonymous communication networks},
abstract = {{This paper gives a short introduction and a comparison on two low-latency
anonymous communication networks. The main part features a review of the low
latency anonymous communication networks, namely, The Onion Routing (Tor) and the
Invisible Internet Project (I2P). An introduction to their overall structure is
given, followed by a detailed description of the core parts of both networks.
Furthermore, a comparison of both will feature important aspects like node
selection, performance and scalability. The detailed description and comparison
of the two systems show that determining which system to use highly depends on
the field of application, since each system has its strength and weaknesses in
specific areas.}},
}

@inproceedings{timpanaro2014,
title = {Group-Based Characterization for the I2P Anonymous File-Sharing Environment},
author = {Timpanaro, J.P. and Chrisment, I and Festor, O.},
booktitle = {Proceedings of the 6th International Conference on New Technologies,
Mobility and Security (NTMS)},
year = {2014},
month = {March},
pages = {1--5},
doi = {10.1109/NTMS.2014.6814020},
www_section = {Traffic analysis},
abstract = {{The I2P network provides an abstraction layer allowing two parties to
communicate in an anonymous manner. This network is optimised for anonymous web
hosting and anonymous file-sharing. I2P's file- sharing community is highly
active where users deploy their file-sharing applications on top of the network.
I2P uses a variation of Onion routing, thus assuring the unlinkability between a
user and its file-sharing application. In this paper, we take the first step
towards the linkability of users and applications in the I2P network. We conduct
a group-based characterisation, where we determine to what extent a group of
users is responsible for the overall I2P's file-sharing activity. We used
Pearson's coefficient to correlate users from two cities and the most used
anonymous file-sharing application. We determine that two cities explain more
than a third of all file-sharing activity within the I2P network.}},
www_pdf_url = {https://hal.inria.fr/hal-00986228/file/NTMS_Paper.pdf},
keywords = {Internet;data privacy;groupware;peer-to-peer computing;I2P anonymous
file-sharing environment;I2P network;Invisible Internet Project;Onion
routing;Pearsons coefficient;abstraction layer;anonymous Web hosting;anonymous
file-sharing application;file-sharing activity;group-based
characterisation;user-application linkability;Cities and
towns;Correlation;Distributed databases;IP networks;Internet;Monitoring;Privacy},
}

@inproceedings{timpanaro:hal-00744922,
title = {{Improving Content Availability in the I2P Anonymous File-Sharing Environment}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
booktitle = {{Proceedings of the 4th International Symposium on Cyberspace Safety and
Security}},
volume = {4},
year = {2012},
month = {December},
address = {Melbourne, Australia},
pages = {77--92},
publisher = {Springer},
hal_id = {hal-00744922},
doi = {10.1007/978-3-642-35362-8},
language = {English},
url = {http://hal.inria.fr/hal-00744922},
abstract = {{Anonymous communication has gained more and more interest from Internet
users as privacy and anonymity problems have emerged. Dedicated anonymous
networks such as Freenet and I2P allow anonymous file-sharing among users.
However, one major problem with anonymous file-sharing networks is that the
available content is highly reduced, mostly with outdated files, and
non-anonymous networks, such as the BitTorrent network, are still the major
source of content: we show that in a 30-days period, 21648 new torrents were
introduced in the BitTorrent community, whilst only 236 were introduced in the
anonymous I2P network, for four different categories of content. Therefore, how
can a user of these anonymous networks access this varied and non-anonymous
content without compromising its anonymity? In this paper, we improve content
availability in an anonymous environment by proposing the first internetwork
model allowing anonymous users to access and share content in large public
communities while remaining anonymous. We show that our approach can efficiently
interconnect I2P users and public BitTorrent swarms without affecting their
anonymity nor their performance. Our model is fully implemented and freely
usable.}},
www_section = {Anonymous communication},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
audience = {international},
www_pdf_url = {http://hal.inria.fr/hal-00744922/PDF/Improving\_Content\_Availability\_in\_the\_I2P\_0AAnonymous\_File-Sharing\_Environment\_0A.pdf},
}

@inproceedings{timpanaro:hal-00744919,
title = {{A Bird's Eye View on the I2P Anonymous File-sharing Environment}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
booktitle = {{Proceedings of the 6th International Conference on Network and System
Security}},
year = {2012},
month = {November},
address = {Wu Yi Shan, China},
hal_id = {hal-00744919},
language = {English},
url = {http://hal.inria.fr/hal-00744919},
abstract = {{Anonymous communications have been gaining more and more interest from
Internet users as privacy and anonymity problems have emerged. Among anonymous
enabled services, anonymous file-sharing is one of the most active one and is
increasingly growing. Large scale monitoring on these systems allows us to grasp
how they behave, which type of data is shared among users, the overall behaviour
in the system. But does large scale monitoring jeopardize the system anonymity?
In this work we present the first large scale monitoring architecture and
experiments on the I2P network, a low-latency message-oriented anonymous network.
We characterize the file-sharing environment within I2P, and evaluate if this
monitoring affects the anonymity provided by the network. We show that most
activities within the network are file-sharing oriented, along with anonymous
web-hosting. We assess the wide geographical location of nodes and network
popularity. We also demonstrate that group-based profiling is feasible on this
particular network.}},
www_section = {Traffic analysis},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
audience = {international},
www_pdf_url = {http://hal.inria.fr/hal-00744919/PDF/A\_Birda\_s\_Eye\_View\_on\_the\_I2P\_Anonymous\_0AFile-sharing\_Environment\_0A.pdf},
keywords = {Large scale monitoring, I2P, Security risks, Anonymous file-sharing},
}

@misc{timpanaro:inria-00632259,
title = {{Monitoring the I2P network}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
year = {2011},
month = {October},
howpublished = {Preprint},
hal_id = {inria-00632259},
language = {English},
url = {http://hal.inria.fr/inria-00632259},
abstract = {{We present the first monitoring study aiming to characterize the usage of
the I2P network, a low-latency anonymous network based on garlic routing. We
design a distributed monitoring architecture for the I2P network and we show
through a one week long experiment that we are able to identify 32\% of all
running applications, among web servers and file- sharing clients. Additionally,
we identify 37\% of published I2P applications, which turn out to be unreachable
after its publication on the I2P distributed database.}},
affiliation = {MADYNES - INRIA Lorraine - LORIA},
www_pdf_url = {http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf},
www_section = {Traffic analysis},
}

@inproceedings{abou-tair2009,
title = {Usability Inspection of Anonymity Networks},
author = {Abou-Tair, D.e.I. and Pimenidis, L. and Schomburg, J. and Westermann, B.},
booktitle = {Proceedings of the World Congress on Privacy, Security, Trust and the
Management of e-Business (CONGRESS '09)},
year = {2009},
month = {August},
pages = {100--109},
doi = {10.1109/CONGRESS.2009.38},
www_section = {Anonymous communication},
abstract = {{Today, to be monitored while surfing the web seems to be a natural act and
thus tools and applications to achieve online anonymity are more important than
ever. The usability of such a tool plays not only a prominent role for each
single user; in the area of anonymization networks it usually holds that the
protection for every single user is higher, the more users participate. Hence,
usability is of great importance, since bad usability decreases the number of
potential users. In this paper we examine the usability of four software
implementations for anonymous communication techniques especially with regards to
the installation procedure. The usability is evaluated with the help of cognitive
walk-throughs. We also inspect the quality of service of these implementations by
means of a performance test.}},
www_pdf_url = {http://pimenidis.org/research/papers/usability-inspection.pdf},
keywords = {Internet;security of data;anonymity networks;anonymization networks;anonymous
communication techniques;cognitive walk-throughs;installation;quality of
service;software implementations;usability inspection;Communication system
security;Inspection;Monitoring;Operating systems;Privacy;Quality
management;Quality of service;System testing;Technology
management;Usability;AN.ON;Anonymity;HCI;JAP;JonDo;JondoNym;Tor;Usability},
}